Wichtige informationen

Dieser Kurs vermittelt folgende Kenntnisse und Fähigkeiten: - Install the Trusted Extensions package onto a Solaris 10 system. - Create and configure labeled zones. - Configure labeled networking in the labeled zones. - Login to Trusted Extensions and use the TX-specific features of the Trusted CDE and Trusted JDS window environments. - Design a security labeling scheme. .. Gerichtet an: Students who can benefit from this course are system administrators and security administrators who are responsible for installing, configuring and managing labeled systems. Systems integrators and designers of classified government systems or commercial systems with high-security data protection needs will also benefit from this course.

Students who can benefit from this course are system administrators and security administrators who are responsible for installing, configuring and managing labeled systems. Systems integrators and designers of classified government systems or commercial systems with high-security data protection needs will also benefit from this course.

Display an understanding of data separation requirements in high-security environments

Perform basic Solaris network configuration tasks

Configure Solaris 10 system features such as zones and file systems

Administer Solaris 10 OS platform systems

Display an understanding of data separation requirements in high-security environments

Perform basic Solaris network configuration tasks

Configure Solaris 10 system features such as zones and file systems

Überblick über den Inhalt des Trainings

Solaris Trusted Extensions Installation, Configuration and Administration provides students with the knowledge to install Solaris Trusted Extensions software onto a system running the Solaris 10 Operating System. The course presents students with how to design and configure the security label mechanisms, use extended security features of the two window managers Trusted CDE and Trusted JDS, and how to compartmentalize system administrator powers through the use of privileges, authorizations, and roles, and then to restrict the capabilities of the users. The course topics focus on features that enhance system security, such as auditing, controlling access to removable media devices, managing local and remote file systems, configuring labeled networking and labeled printing, setting up LDAP on Trusted Extensions, and migrating from Trusted Solaris 8 to Solaris Trusted Extensions.

Introducing Trusted Extensions Features

Describe the history of Trusted Solaris and Trusted Extensions

Describe the Common Criteria requirements

Examine the importance of Mandatory Access Controls

Describe the features of Trusted Extensions

Trusted Extensions Installation

Understand the relationship between Trusted Extensions (TX) software and the Solaris 10 Operating System

Determine the pre-installation implementation considerations

Install the Trusted Extensions packages

Trusted Extensions Configuration

Use the Solaris Management Console and other Trusted Extensions GUIs to configure TX options